Secure data transmission in WSN: An overview

M Elhoseny, AE Hassanien, M Elhoseny… - … Sensor Networks: New …, 2019 - Springer
Building a secure routing protocol in WSN is not trivial process. Thee are two main types of
security attacks against WSNs: active and passive. WSN as a new category of computer …

[PDF][PDF] Recent advances of secure clustering protocols in wireless sensor networks

M Elhoseny, H Elminir, AM Riad… - International Journal of …, 2014 - researchgate.net
ABSTRACT Wireless Sensor Networks (WSNs) have been employed in many real-world
applications that greatly improve our life. The ubiquitous WSNs make security a prime issue …

[PDF][PDF] An experimental simulation of addressing auto-configuration issues for wireless sensor networks

IS Kocher - Computers, Materials & Continua, 2022 - academia.edu
Applications of Wireless Sensor devices are widely used by various monitoring sections
such as environmental monitoring, industrial sensing, habitat modeling, healthcare and …

Secure image processing and transmission schema in cluster-based wireless sensor network

M Elhoseny, A Farouk, J Batle, A Shehab… - Sensor Technology …, 2020 - igi-global.com
WSN as a new category of computer-based computing platforms and network structures is
showing new applications in different areas such as environmental monitoring, health care …

[PDF][PDF] Efficient group key management using symmetric key and threshold cryptography for cluster based wireless sensor networks

A Diop, Y Qi, Q Wang - International Journal of Computer Network …, 2014 - mecs-press.org
Research in Wireless Sensor Networks (WSNs) has made a significant progress recently,
especially the area of key management, which plays a central role for protecting group …

New trends in secure routing protocols for wireless sensor networks

AM El-Semary, MM Abdel-Azim - International Journal of …, 2013 - journals.sagepub.com
Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of
applications including homeland security, military systems, and health care. Sensor nodes …

An efficient key management scheme for content access control for linear hierarchies

HR Hassen, H Bettahar, A Bouadbdallah, Y Challal - Computer Networks, 2012 - Elsevier
The content access control problem appears in any context with a set of users and
resources. The difference in access rights of the users defines classes, where members of a …

DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks

R Bellazreg, N Boudriga - EURASIP Journal on Wireless Communications …, 2014 - Springer
Wireless sensor networks (WSNs) are being used for many applications ranging from mobile
target surveillance to intelligent home networking. Due to the sensitive nature of the data …

[PDF][PDF] A Systematic Roadmap on Privacy, Security, Trust, Identity Management, and Resilience: Wireless Sensor Networks and Internet of Things Architectures

IS Kocher - Academic Journal of Nawroz University, 2023 - researchgate.net
As everything around us will be linked to the net in many ways via the Internet of Things
(IoTs) and compared to the standard Internet, new forms of problems and complications can …

[PDF][PDF] Performance evaluation of novel secure key management scheme over ban wireless sensor networks

IS Gawdan, QI Sarhan - Journal of University of Duhok, 2016 - academia.edu
Recent researches have witnessed that secret keying functionality is very important to
protect wireless sensor networks from existing adversary. Based on inherited nature and …